1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
8

What question for attack libraries help answer?

Computers and Technology
1 answer:
ch4aika [34]3 years ago
6 0

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




You might be interested in
Which directory holds most of the system log files?
faust18 [17]
I think the answer to that is /var/log hope this helps
5 0
3 years ago
Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
gulaghasi [49]

Answer:

The total const is 13025 KWh

Explanation:

These are the steps to solve this problem:

  1. Convert all the powers from W to KW dividing by 1000.
  2. Convert all the times on minutes to hours dividing by 60.
  3. Then you can apply energy consumption formula Energy = Power*Time for any of the appliances. the results will be at KWh.
  4. Sum all the consumtions and you will have the total cost.

Attached you will have a spreadsheet as a guidance. Any  questions, just let me know.

Download xlsx
7 0
3 years ago
"Switches break up _______________ domains and routers break up _____________ domains."
mel-nik [20]

Answer:

Switches break up collision domains and routers break up broadcast domains.

Explanation:

  • Collision domain depicts the part within a network where a collision can happen.
  • Collision occurs when two hosts transmit data packet at the same time within a network. Theses packets collide and the hosts have to resend the data after some time.
  • Too many collisions can result in slow traffic speed and can effect network performance.
  • So switches break up collision domains between the devices on a network and each port in a switch depicts a collision domain. This reduces the chance of packet collisions between the devices or hosts.
  • When data is to be sent to a host, the switch keeps that data frame and waits for availability of the destination host before sending the data frame.
  • Moreover full duplex switch mode there is not chance of collision as the transmitting path on one host is the receiving path on other host.
  • Broadcast domain contains all the hosts that can reach each other at the Data Link layer via broadcast.
  • Routers break up broadcast domains as routers contain separate broadcast domains for each interface.
  • Routers do not forward broadcasts from one broadcast domain to other and drop the packet when they detect a broadcast address.
4 0
3 years ago
100 POINTS
agasfer [191]

Answer:

i'm just a kid ku ku ku ku ku ku ku ku ku ku ku ku

6 0
3 years ago
Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier
Zarrin [17]

Answer:Ctrl + V

Explanation:

7 0
2 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • WILL UPVOTE NEED ANSWERS ASAP i have till 4:30
    12·1 answer
  • What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
    12·1 answer
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • What is a word processor in ms word​
    9·2 answers
  • Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, Accoun
    10·2 answers
  • Truth or dare????????????
    5·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • Help please match them if you just put a link or say “I don’t know but thanks for the points” I’ll report your answer and you wo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!